Current
new_year_resolution [version 2018.1.1]: unable to find patch
7 yrs ago
Frozen. Chills up her spine. Her hands trembling, her breath short. Her world crumbled before her. The girl forgot to do her homework
2
likes
7 yrs ago
sorry Brain my Christmas is too intoxicated with Guys at Posts. I will get a Beer up tomorrow
2
likes
7 yrs ago
~and those who are drunk *hiccup*
1
like
7 yrs ago
There are two kinds of people in this world; those who like Christmas, and those who are potatoes.
3
likes
Bio
About Tera
Name: Terra Occupation: Game Dev
Never Ending To-Do List ಠ‿ಠ 1. Character Sheet [Volæria: A Red Rose in November] 2. First IC [HACKERS.CHATROOM] 3. Character Sheet [Walking Dead: Europe] 4. Character Sheet [The Manta Lines] 5.
@Mattchstick hum I started out planning this as a free to low casual rp so I didn’t have much back story going on to not scare the target audience away xD but we can develop more on it nonetheless; maybe we can unfold more story gradually after the IC starts. And yeah I will gladly take help of a co-GM too seeing there will also be need to manage both discord and IC posts :) welcome aboard
I’m currently looking for roleplays in murder mystery*** or possibly realistic horrors; hit me up too if you have any original story ideas. I can post in any range from one-liners to a few paragraphs (or even a whole page if it appeals to me), so PM me if you have any ideas on those, or we can create a story together. 😄
Attempting connection to irc.secret.n𝘦t (Standalone Servers) on port 1314 Looking up server host name (irc.secret.n𝘦t)... Server has 16 IP addresses, random address selected Server host name resolved to 289.45.21O.21 Contacting IRC server irc.secret.n𝘦t (289.45.21O.21) on port 1314 Connection established [irc.secret.n𝘦t (289.45.21O.21:1314)] Local host address is 192.168.1.7 Login operations initiated Input value for username: ▂
CHATROOM_3
User <Traps> has joined #Chatroom_3 <Keeper_3> Welcome, Traps. <Traps> Hi <Keeper_3> Before you start, some simple questions to make sure that you are okay with the channel. Standard procedure, I hope that you understand. <Traps> Go ahead <Keeper_3> Excellent. First, are you in any way affiliated with government bodies? <Traps> Not at all <Keeper_3> Do you agree to discuss the contents of the channel with no one, and refrain from storing logs? <Traps> Okay. I make deleting browser history a habit. <Keeper_3> Nice... <Keeper_3> That's actually all. You're good to go. <Keeper_3> Finally, do you have any questions for me? <Traps> Yes, a serious one. About the server... <Keeper_3> I will see if I can answer that. <Keeper_3> Do note that some of the information are confidential for security purposes. <Traps> So why is my name pink? <Keeper_3> ... User <Keeper_3> has logged off <Traps> Can you help me change it to something coo▂
METAGAME
The Roleplay will be about a secret chatroom on the internet only accessible to those talented in hacking. All kinds of anonymous hackers congregate here to discuss about hacking, form alliances, or sell and buy "services". There are a total of 16 chatrooms (Chatroom_0 to Chatroom_15) but this role play will take place mainly in Chatroom_3. Each chat room has a keeper that takes care and manages the channel to prevent leakage of information. The origin of the Hacker's Chatroom is a mystery.
RPers post in the form of chat logs, hacking behaviors (for example if you hack into a bank there will be codes; you don’t need to understand programming, just be creative), and a bit of actions in roleplay characters’ life. It can be a role play ranging from free jump-in or casual apply depending on RPers' interests. :)
WORLD SETTING
The role play is set in a universe very similar to ours. World events tie loosely to real world events. The date is Sunday, 24th December 2017 (GMT) and it is Christmas Eve.
THE CHATROOM
The Secret Net was an open-sourced software designed for traceless communications between criminals and people intending to keep their identities anonymous. Just like many other open-sourced codes before it, its origin was largely a mystery with its creator unknown. The Secret Net did not catch the public eye, until five years ago when a notorious group of seventeen hackers calling themselves "The Keepers" decided to alter the software's source code and designed it in a way that they have full control on the traffic of the Secret Net. The new software then became a popular social platform among hackers well-known for its impenetrable security, and hence the origin of what you know today as the Hackers' Chatroom.
The main server of the Hackers' Chatroom does not occupy a specific physical location. In fact, every user device acts as a server to the chatroom upon first connection, making it near impossible to DDoS or shut down as long as any one of the users are still connected to it. Depending on individual chatroom keepers, some may host the channel's database in a well-maintained server room for additional security measures. Each keeper has a unique way of defending and managing their own channels.
ROLEPLAY PLATFORMS
Discord *Discord Logs will be posted regularly by GM to the IC post. 1. Chatroom_3: Public Channel 2. Chatroom_3: Users PM Channel 3. Chatroom_3: System Channel
Forum IC Posts 4. Personal Device Interface (hacking jobs, notes keeping, program creations, etc.) 5. External Systems (Bank security servers for example) 6. Character Real Life (thought processes and real life behaviors)
USERS
1. The Keepers The infamous hacker group consists of 17 team members each skilled in executing different types of hacks. Throughout the last decade, large-scale hacks have been performed by the group, inflicting widespread financial damage to the world. Nobody knows their exact identity, and what is the organization's ultimate intentions. The Keepers are the main managers of the 16 channels of the Hackers' Chatroom.
2. Hackers Those who are talented enough to hack and access the secret net are mostly welcomed to mingle in the chatroom as long as they follow the keepers' rules. Hackers often befriend, chat and share about their hacking experiences with each other, forming a sense of bond within the hacker community.
3. Criminals Non-hacker criminals may access the net through special means approved by the keepers. They make use of the chatroom to contact with clients that are looking for their special services, or collude with other criminals in performing illegal activities.
4. Clients Through a cleverly designed security system, clients may be granted temporary restricted access to the Hackers' Chatroom to buy all kinds of services from other criminals.
5. Others Sometimes secret agents, lost birds, and people who might cause trouble to the chat room may gain access to the platform. The keepers do not welcome this sort of people and will ban their IP address immediately upon exposure.
CHARACTERS
Name: real name
Username: your pseudo-name in the chatroom channel
Chat color: pick a color to represent you. First come first serve (and pink is available, no worries)
Device(s): laptops, computers used to access the chatroom and hack stuff.
Occupation: Be it a spy, a freelance hacker, a computer science major, a police officer, a serial killer...
Cyberskills: any skills related to computer or hacking.
Personality: how you are like in the real world vs the cyber world.
Background: what is your history in the real world and cyber world.
Name Kelly Watson
Username Keeper_3
Chat Color Peachpuff [HEX:#FFDAB9]
Device(s)
As a feverish Apple fan, she always has the brand new Mac and iPhone at her disposal. Although simple they may seem to be, Kelly is able to make use of the devices to perform quick and sneaky hacks whenever she needs to get a job done.
Occupation Magazine Bikini Model Youngest member of The Keepers
Background Kelly has become the new keeper of Chatroom_3 after mysterious disappearance of the previous keeper two years ago. Although not new to hacking, the girl is still new to the keeper's job. She still makes mistakes here and there -almost exposing the whole channel at times- and requires help from other keepers to help her in fixing her errors.
HACKING 101 (OPTIONAL)
On writing professional codes... or how to make up fake convincing ones
The essence about programming is to understand that machines are brainless, and all you are doing when you code is you are ordering it to perform precise tasks for you. There are countless programming languages out there, but the logic is always the same. Here are some simple steps on how to code a program (note the coding terms are not real, I made it more intuitive):
1. Define your goal Lets say you want to program your robot to move from point A to point B which is 100 meters away, then you have to break down the goal into more objective and precise actions: move the robot forward for 100 meters.
2. Step by step Every single command needs to be written down. In the previous case, the pseudo-code can look like the following:
3. Group repetitive actions into functions As you can see, actions can get too repetitive. In coding, you may define functions and loop them. Lets call the function "Walk", and we input "stepsLeft" into the function. The indentation is used to indicate that the coding lines are grouped under the same function.
What the code did there was first it defined a function named "Walk" with the input variable named "stepsLeft". Depending on the steps you input, the robot will walk for that exact amount of steps. Then finally, it calls out the function "Walk(100)" which means the robot will walk for 100 exact steps forward. You can also loop the actions without defining a function:
Robot
loop for 100 times:
move right_leg forward; move left_leg forward;
4. Let your robot make binary decisions Sometimes a decision cannot be made on the point of writing the software. This calls for decision making by the robot. For example, the distance of point B is undefined. The robot needs to sense whether it has reached the location every time before it makes the next step. Do note that robots can only make binary decisions (Things that are true or false):
Robot
define Walk:
move right_leg forward; move left_leg forward;
loop if sense(location) not equal Point_B:
Walk;
5. Be precise Just remember that every single command needs to be precise and not ambiguous. For example, "walk for a long distance" is not precise enough as the word long is really subjective; "walk for 100 steps" is a better choice.
6. Be consistent and organized Organize your codes with proper indentations, punctuation, and spaces. Be consistent with the word choices you are using. If you use the term "loop" to repeat your robot's actions, don't change it into words like "repeat" or "again" in the same program. Be consistent with how you organize the code as well.
7. Comments Sometimes there is a need to put comments in your code so that you (or others) understand what each section of the program means at first glance. Here is one way to do it:
Robot
//This part defines a function to walk forward// define Walk:
move right_leg forward; move left_leg forward;
//This section senses if the robot has reached its location, and continue moving if it is not// loop if sense(location) not equal Point_B:
Walk;
Comments are invisible to the robot upon execution. They are purely there for clarification purposes to the human programmer.
8. Use your creativity
The beauty of programming is there are always more than one solution to a problem. So use your creativity! As long as it gets the job done, it is a good code. In a role play, if you are creative enough, you may even express your character's personality through your codes. No single hacker approaches a single problem from the same perspective.
[indent][indent][h1][color=mediumseagreen][b]About Tera[/b][/color][/h1]
[color=springgreen]Name:[/color] Terra
[color=springgreen]Occupation:[/color] Game Dev
[hider=Never Ending To-Do List]
[color=springgreen][b][u]Never Ending To-Do List[/u][/b][/color] ಠ‿ಠ
1. Character Sheet [Volæria: A Red Rose in November]
2. First IC [HACKERS.CHATROOM]
3. Character Sheet [Walking Dead: Europe]
4. Character Sheet [The Manta Lines]
5.
[/hider]
[img]https://media.giphy.com/media/mG4o6qSWU6CAw/giphy.gif[/img]
[/indent][/indent]
<div style="white-space:pre-wrap;"><div class="bb-indent"><div class="bb-indent"><div class="bb-h1"><font color="mediumseagreen"><span class="bb-b">About Tera</span></font></div><br><br><font color="springgreen">Name:</font> Terra<br><font color="springgreen">Occupation:</font> Game Dev <br><br><div class="hider-panel"><div class="hider-heading"><button type="button" class="btn btn-default btn-xs hider-button" data-name="Never Ending To-Do List">Never Ending To-Do List [+]</button></div><div class="hider-body" style="display: none"><font color="springgreen"><span class="bb-b"><span class="bb-u">Never Ending To-Do List</span></span></font> ಠ‿ಠ<br>1. Character Sheet [Volæria: A Red Rose in November]<br>2. First IC [HACKERS.CHATROOM]<br>3. Character Sheet [Walking Dead: Europe]<br>4. Character Sheet [The Manta Lines]<br>5.</div></div><br><img src="https://media.giphy.com/media/mG4o6qSWU6CAw/giphy.gif" /></div></div><br></div>